Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (79)
- Computer Sciences (56)
- Physical Sciences and Mathematics (56)
- Information Security (51)
- Science and Technology Law (51)
-
- Social and Behavioral Sciences (46)
- Engineering (43)
- Computer Engineering (39)
- Privacy Law (37)
- Electrical and Computer Engineering (36)
- Forensic Science and Technology (36)
- Intellectual Property Law (36)
- Legal Studies (36)
- International Law (14)
- Consumer Protection Law (13)
- Constitutional Law (10)
- First Amendment (10)
- Communications Law (9)
- Contracts (9)
- Law and Society (9)
- Commercial Law (8)
- Comparative and Foreign Law (7)
- Criminal Law (7)
- Legal Writing and Research (6)
- Litigation (6)
- Marketing Law (6)
- Administrative Law (5)
- Business (5)
- Institution
-
- Embry-Riddle Aeronautical University (48)
- UIC School of Law (21)
- Selected Works (18)
- SelectedWorks (15)
- Schulich School of Law, Dalhousie University (12)
-
- Maurer School of Law: Indiana University (8)
- Pepperdine University (6)
- University of Maryland Francis King Carey School of Law (6)
- Pace University (3)
- Seattle University School of Law (3)
- American University Washington College of Law (2)
- Chicago-Kent College of Law (2)
- Loyola University Chicago, School of Law (2)
- Northwestern Pritzker School of Law (2)
- SJ Quinney College of Law, University of Utah (2)
- University of Georgia School of Law (2)
- University of Pennsylvania Carey Law School (2)
- University of Pittsburgh School of Law (2)
- University of Richmond (2)
- University of Washington School of Law (2)
- University of the Pacific (2)
- California State University, San Bernardino (1)
- Columbia Law School (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Penn State Law (1)
- Singapore Management University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- Vanderbilt University Law School (1)
- Washington and Lee University School of Law (1)
- Keyword
-
- Privacy (13)
- Computer Law (12)
- Law and Technology (10)
- Internet (8)
- Copyright (7)
-
- Cybersecurity (6)
- First Amendment (6)
- Intellectual Property Law (6)
- Data protection (5)
- Google (5)
- Science and Technology (5)
- Communications Law (4)
- Computers (4)
- Constitutional Law (4)
- Consumer Protection Law (4)
- Data privacy (4)
- Evidence (4)
- Facebook (4)
- Risk (4)
- Computer (3)
- Contracts (3)
- Cybercrime (3)
- Digital forensics (3)
- Discovery (3)
- Social Implications of ICT (3)
- Social media (3)
- Software (3)
- Threat (3)
- Automated Psychological assessment (2)
- Cloud computing (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (35)
- UIC John Marshall Journal of Information Technology & Privacy Law (14)
- Annual ADFSL Conference on Digital Forensics, Security and Law (13)
- Canadian Journal of Law and Technology (11)
- Articles by Maurer Faculty (5)
-
- Journal of Business & Technology Law (4)
- UIC Review of Intellectual Property Law (4)
- All Faculty Scholarship (3)
- Journal of the National Association of Administrative Law Judiciary (3)
- Pepperdine Law Review (3)
- Professor Katina Michael (3)
- Rodolfo C. Rivas (3)
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Children's Legal Rights Journal (2)
- Curtis E.A. Karnow (2)
- Faculty Scholarship (2)
- Frank A. Pasquale (2)
- Georgia Journal of International & Comparative Law (2)
- Guido Noto La Diega (2)
- Jonathan I. Ezor (2)
- McGeorge Law Review (2)
- Northwestern Journal of Technology and Intellectual Property (2)
- Richmond Journal of Law & Technology (2)
- Seattle University Law Review (2)
- Technology Law and Public Policy Clinic (2)
- UIC Law Review (2)
- Utah OnLaw: The Utah Law Review Online Supplement (2)
- Abu Noman Mohammad Atahar Ali (1)
- Allyson Haynes Stuart (1)
Articles 151 - 171 of 171
Full-Text Articles in Computer Law
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley
Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley
Articles
A seminar on Artificial Intelligence ("Al") and Law can teach law students lessons about legal reasoning and legal practice in the digital age. Al and Law is a subfield of Al/computer science research that focuses on designing computer programs—computational models—that perform legal reasoning. These computational models are used in building tools to assist in legal practice and pedagogy and in studying legal reasoning in order to contribute to cognitive science and jurisprudence. Today, subject to a number of qualifications, computer programs can reason with legal rules, apply legal precedents, and even argue like a legal advocate.
This article provides a …
Google And Search-Engine Market Power, Mark R. Patterson
Google And Search-Engine Market Power, Mark R. Patterson
Faculty Scholarship
A significant and growing body of commentary considers whether possible manipulation of search results by Google could give rise to antitrust liability. Surprisingly, though, little serious attention has been paid to whether Google has market power. Those who favor antitrust scrutiny of Google generally cite its large market share, from which they infer or assume its dominance. Those who are skeptical of competition law’s role in regulating search, on the other hand, usually cite Google’s 'competition is only a click away' mantra to suggest that Google’s market position is precarious. In fact, the issue of Google’s power is more complicated …
Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor
Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor
Scholarly Works
Educators are constantly seeking new sources of relevant material to illustrate doctrinal and practice topics. With the growing understanding of students’ different learning styles, as well as the expansion of high-speed network connections and large displays in the classroom, streaming video has begun gaining popularity as an educational tool. Films, television programs, and real-time and archived legislative and court sessions may provide examples (both positive and negative) to enhance pedagogy. One increasingly common source for streaming content is a commercial video provider such as Netflix, Amazon, and Hulu. Even where such providers do not offer educational or institutional services, educators …
System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter
System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter
Journal of Digital Forensics, Security and Law
Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
Elisabeth Haub School of Law Faculty Publications
This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …
Safe To Be Open: Study On The Protection Of Research Data And Recommendations For Access And Usage, Lucie Guibault, Andreas Wiebe
Safe To Be Open: Study On The Protection Of Research Data And Recommendations For Access And Usage, Lucie Guibault, Andreas Wiebe
Books
Openness has become a common concept in a growing number of scientific and academic fields. Expressions such as Open Access (OA) or Open Content (OC) are often employed for publications of papers and research results, or are contained as conditions in tenders issued by a number of funding agencies. More recently the concept of Open Data (OD) is of growing interest in some fields, particularly those that produce large amounts of data – which are not usually protected by standard legal tools such as copyright. However, a thorough understanding of the meaning of Openness – especially its legal implications – …
Man Versus Machine Review: The Showdown Between Hordes Of Discovery Lawyers And A Computer-Utilizing Predictive-Coding Technology, Nicholas Barry
Man Versus Machine Review: The Showdown Between Hordes Of Discovery Lawyers And A Computer-Utilizing Predictive-Coding Technology, Nicholas Barry
Vanderbilt Journal of Entertainment & Technology Law
The discovery process is regularly capturing millions of pages of documents. Electronic storage is making storing documents cheaper and easier. When litigation begins, however, sorting through this massive amount of electronically stored information is costly and time intensive. Keyword searches are a start to managing the growing amount of electronic documents, but the discovery process is still falling behind in efficiency. Predictive coding could change all that.
Predictive coding is capable of solving the time-intensive nature (and resultant growing cost) of processing discovery documents. Predictive coding is faster, cheaper, and more accurate than traditional linear document review, the current "gold …
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Asbca's Path To The Mega Adr In Computer Sciences Corporation, Paul Williams, Reba Ann Page
The Asbca's Path To The Mega Adr In Computer Sciences Corporation, Paul Williams, Reba Ann Page
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Giving Purpose To Your Life As A Legal Writer, David Spratt
Giving Purpose To Your Life As A Legal Writer, David Spratt
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Articles
Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.
At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …
The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander
The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander
Georgetown Law Faculty Publications and Other Works
On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?
In this accessible book, cyber-law expert Anupam Chander provides the first thorough …
Mad Men Posing As Ordinary Consumers: The Essential Role Of Self-Regulation And Industry Ethics On Decreasing Deceptive Online Consumer Ratings And Reviews, 12 J. Marshall Rev. Intell. Prop. L. 462 (2013), Lucille M. Ponte
UIC Review of Intellectual Property Law
Technology provides consumers with new ways to avoid advertisements, such as fast forwarding through TV commercials and using filtering software to block pop-up ads. Accordingly brand sponsors and their advertising marketing firms have sought alternative methods to pierce through consumer resistance to ads. Social media offers an optimal platform to reach millions of consumers on a nearly daily basis who interact and often rely heavily on the reviews and rankings of fellow consumers. However, many of today’s branding campaigns now mask sponsored ads as ordinary consumer reviews or “Like” and “Don’t Like” responses to a service or product. Unbeknownst to …
Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach
Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach
Ulf Maunsbach
During recent years the European Court of Justice (ECJ) has proven to be increasingly active in relation to cross-border intellectual property disputes. The relevant cases cover a wide range of issues, from advertisement through use of keywords, to copyright-related issues involved in making protected material available through the Internet. All in all, it might be said that the Internet era has finally reached the Court of Justice. A similar development is visible in Swedish courts. This provides for an unlimited amount of material for further discussion. In this paper I would like to provide a short summary of the recent …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
Professor Katina Michael
Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
Stephen E Henderson
This paper tells two stories. One concerns the investigation of a Delaware physician named Earl B. Bradley that resulted in a conviction and sentence of fourteen consecutive life terms for the sexual abuse of children. The other concerns the computer problems, both judicial and extra-judicial, of Chief Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit. Though in a sense unrelated, they share lessons about the practicalities of computers and their search that are worth telling. As courts continue to struggle with how to cabin the searches of computers in order to minimize privacy intrusion …
Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq.
Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq.
Rodolfo C. Rivas
The author provides a brief overview of the World Trade Organization (WTO), the International Monetary Fund (IMF) and the World Bank (WB) by explaining the context of their interrelationship. Afterwards, the author delves into a brief analysis of Mexico’s role in the International Trade arena and concludes by describing the paths through which the private sector can benefit from the WTO.///////////////////////////////////////////////////////////////////////////////////////El autor pone en contexto la interrelación entre la Organización Mundial del Comercio (OMC) el Banco Mundial (BM) y el Fondo Monetario Internacional (FMI). Posteriormente, el autor describe brevemente el rol de México dentro de las instituciones de Comercio Internacional …